Questions on using EAP-AKA

Ben Greear greearb at candelatech.com
Tue Dec 31 14:33:34 EST 2013


Ok, so with using openssl, things are getting farther.  When sniffing
the RADIUS side, I see:

Radius Request
Radius challenge
Radius Request
Radius Challenge
Radius Request
Radius Accept

But, after 30 seconds or so, the AP disconnects the station, apparently
because the AP thinks the station is not authorized.  Any idea what might
be missing?

As an aside, we are trying to set up a free-radius server that we can
test AKA against, and having a hard time finding any useful docs on how
to do this.  If anyone on the list has any pointers, please let me know.


The supplicant log is below...

1388544510.995681: sta5: SME: Trying to authenticate with 84:1b:5e:5d:a7:70 (SSID='NETGEAR_11ng' freq=2412 MHz)
1388544510.995689: sta5: No keys have been configured - skip key clearing
1388544510.995696: sta5: State: SCANNING -> AUTHENTICATING
1388544510.995705: EAPOL: External notification - EAP success=0
1388544510.995712: EAPOL: Supplicant port status: Unauthorized
1388544510.995719: nl80211: Set supplicant port unauthorized for 00:00:00:00:00:00
1388544510.995776: EAPOL: External notification - EAP fail=0
1388544510.995786: EAPOL: Supplicant port status: Unauthorized
1388544510.995793: nl80211: Set supplicant port unauthorized for 00:00:00:00:00:00
1388544510.995821: EAPOL: External notification - portControl=Auto
1388544510.995833: EAPOL: Supplicant port status: Unauthorized
1388544510.995839: nl80211: Set supplicant port unauthorized for 00:00:00:00:00:00
1388544510.995867: nl80211: Authenticate (ifindex=121)
1388544510.995880:   * bssid=84:1b:5e:5d:a7:70
1388544510.995889:   * freq=2412
1388544510.995896:   * SSID - hexdump_ascii(len=12):
     4e 45 54 47 45 41 52 5f 31 31 6e 67               NETGEAR_11ng
1388544510.995927:   * IEs - hexdump(len=0): [NULL]
1388544510.995933:   * Auth Type 0
1388544511.015880: nl80211: Authentication request send successfully
1388544511.015928: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
1388544511.015941: RTM_NEWLINK, IFLA_IFNAME: Interface 'sta5' added
1388544511.015968: nl80211: if_removed already cleared - ignore event
1388544511.015982: nl80211: Event message available
1388544511.016001: nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for sta5
1388544511.016014: nl80211: New station 84:1b:5e:5d:a7:70
1388544511.020702: nl80211: Event message available
1388544511.020737: nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for sta5
1388544511.020756: nl80211: MLME event 37 (NL80211_CMD_AUTHENTICATE) on sta5(00:0b:c8:b3:d9:80) A1=00:0b:c8:b3:d9:80 A2=84:1b:5e:5d:a7:70
1388544511.020770: nl80211: MLME event frame - hexdump(len=30): b0 00 3a 01 00 0b c8 b3 d9 80 84 1b 5e 5d a7 70 84 1b 5e 5d a7 70 00 10 00 00 02 00 00 00
1388544511.020785: nl80211: Authenticate event
1388544511.020796: sta5: Event AUTH (11) received
1388544511.020808: sta5: SME: Authentication response: peer=84:1b:5e:5d:a7:70 auth_type=0 auth_transaction=2 status_code=0
1388544511.020819: SME: Authentication response IEs - hexdump(len=0): [NULL]
1388544511.020829: sta5: set_htcap, ht_mcs -::-
1388544511.020839: sta5: htcap value[0]: 0 end: 0x950330  tmp: 0x950330
1388544511.020848: sta5: set_disable_max_amsdu: -1
1388544511.020856: sta5: set_ampdu_factor: -1
1388544511.020864: sta5: set_ampdu_density: -1
1388544511.020871: sta5: set_disable_ht40: 0
1388544511.020878: sta5: set_disable_sgi: 0
1388544511.020889: sta5: Trying to associate with 84:1b:5e:5d:a7:70 (SSID='NETGEAR_11ng' freq=2412 MHz)
1388544511.020898: sta5: State: AUTHENTICATING -> ASSOCIATING
1388544511.020905: wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
1388544511.020912: netlink: Operstate: linkmode=-1, operstate=5
1388544511.020929: WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00
1388544511.020945: nl80211: Associate (ifindex=121)
1388544511.020954:   * bssid=84:1b:5e:5d:a7:70
1388544511.020962:   * freq=2412
1388544511.020968:   * SSID - hexdump_ascii(len=12):
     4e 45 54 47 45 41 52 5f 31 31 6e 67               NETGEAR_11ng
1388544511.020985:   * IEs - hexdump(len=28): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 7f 04 00 00 0a 02
1388544511.021000:   * pairwise=0xfac04
1388544511.021007:   * group=0xfac02
1388544511.021041: nl80211: Association request send successfully
1388544511.038621: sta5: RX EAPOL from 84:1b:5e:5d:a7:70
1388544511.038639: RX EAPOL - hexdump(len=14): 02 00 00 0a 01 00 00 0a 01 68 65 6c 6c 6f
1388544511.038655: sta5: Not associated - Delay processing of received EAPOL frame (state=ASSOCIATING bssid=00:00:00:00:00:00)
1388544511.038773: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
1388544511.038799: RTM_NEWLINK, IFLA_IFNAME: Interface 'sta5' added
1388544511.038824: nl80211: if_removed already cleared - ignore event
1388544511.041088: nl80211: Event message available
1388544511.041116: nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for sta5
1388544511.041127: nl80211: MLME event 38 (NL80211_CMD_ASSOCIATE) on sta5(00:0b:c8:b3:d9:80) A1=00:0b:c8:b3:d9:80 A2=84:1b:5e:5d:a7:70
1388544511.041139: nl80211: MLME event frame - hexdump(len=176): 10 00 3a 01 00 0b c8 b3 d9 80 84 1b 5e 5d a7 70 84 1b 5e 5d a7 70 10 10 11 04 00 00 01 c0 01 08
02 04 0b 0c 12 16 18 24 32 04 30 48 60 6c 2d 1a ad 01 1b ff 7f ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 33 1a ad 01 1b ff 7f ff 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 01 00 15 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 34 16 01 00 15 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 dd 18 00 50 f2 02 01 01 82 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
1388544511.041201: nl80211: Associate event
1388544511.041214: sta5: Event ASSOC (0) received
1388544511.041244: sta5: Association info event
1388544511.041257: resp_ies - hexdump(len=146): 01 08 02 04 0b 0c 12 16 18 24 32 04 30 48 60 6c 2d 1a ad 01 1b ff 7f ff 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 33 1a ad 01 1b ff 7f ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 01 00 15 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 34 16 01 00 15 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 18 00 50 f2 02 01 01 82 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62
32 2f 00
1388544511.041310: WPA: Unrecognized EAPOL-Key Key Data IE - hexdump(len=28): 33 1a ad 01 1b ff 7f ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1388544511.041328: WPA: Unrecognized EAPOL-Key Key Data IE - hexdump(len=24): 3d 16 01 00 15 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1388544511.041348: WPA: Unrecognized EAPOL-Key Key Data IE - hexdump(len=24): 34 16 01 00 15 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1388544511.041367: IEEE 802.11 element parse ignored unknown element (id=51 elen=26)
1388544511.041378: IEEE 802.11 element parse ignored unknown element (id=52 elen=22)
1388544511.041391: sta5: freq=2412 MHz
1388544511.041401: FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0):
1388544511.041414: sta5: State: ASSOCIATING -> ASSOCIATED
1388544511.041426: wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
1388544511.041438: netlink: Operstate: linkmode=-1, operstate=5
1388544511.041460: sta5: Associated to a new BSS: BSSID=84:1b:5e:5d:a7:70
1388544511.041475: sta5: No keys have been configured - skip key clearing
1388544511.041490: sta5: Associated with 84:1b:5e:5d:a7:70
1388544511.041501: sta5: WPA: Association event - clear replay counter
1388544511.041513: sta5: WPA: Clear old PTK
1388544511.041523: TDLS: Remove peers on association
1388544511.041531: EAPOL: External notification - portEnabled=0
1388544511.041542: EAPOL: Supplicant port status: Unauthorized
1388544511.041553: nl80211: Set supplicant port unauthorized for 84:1b:5e:5d:a7:70
1388544511.041603: EAPOL: External notification - portValid=0
1388544511.041615: EAPOL: Supplicant port status: Unauthorized
1388544511.041623: nl80211: Set supplicant port unauthorized for 84:1b:5e:5d:a7:70
1388544511.041659: EAPOL: External notification - portEnabled=1
1388544511.041671: EAPOL: SUPP_PAE entering state CONNECTING
1388544511.041678: EAPOL: enable timer tick
1388544511.041686: EAPOL: SUPP_BE entering state IDLE
1388544511.041695: EAP: EAP entering state INITIALIZE
1388544511.041704: EAP: EAP entering state IDLE
1388544511.041716: sta5: Setting authentication timeout: 10 sec 0 usec
1388544511.041728: sta5: Cancelling scan request
1388544511.041742: sta5: P2P: Station mode scan operation not pending anymore (sta_scan_pending=0 p2p_cb_on_scan_complete=0)
1388544511.041760: sta5: Process pending EAPOL frame that was received just before association notification
1388544511.041772: sta5: RX EAPOL from 84:1b:5e:5d:a7:70
1388544511.041781: RX EAPOL - hexdump(len=14): 02 00 00 0a 01 00 00 0a 01 68 65 6c 6c 6f
1388544511.041796: sta5: Setting authentication timeout: 70 sec 0 usec
1388544511.041809: EAPOL: Received EAP-Packet frame
1388544511.041819: EAPOL: SUPP_PAE entering state RESTART
1388544511.041827: EAP: EAP entering state INITIALIZE
1388544511.041837: EAP: EAP entering state IDLE
1388544511.041846: EAPOL: SUPP_PAE entering state AUTHENTICATING
1388544511.041855: EAPOL: SUPP_BE entering state REQUEST
1388544511.041865: EAPOL: getSuppRsp
1388544511.041873: EAP: EAP entering state RECEIVED
1388544511.041888: EAP: Received EAP-Request id=0 method=1 vendor=0 vendorMethod=0
1388544511.041902: EAP: EAP entering state IDENTITY
1388544511.041912: sta5: CTRL-EVENT-EAP-STARTED EAP authentication started
1388544511.041924: EAP: Status notification: started (param=)
1388544511.041935: EAP: EAP-Request Identity data - hexdump_ascii(len=5):
     68 65 6c 6c 6f                                    hello
1388544511.041957: EAP: using real identity - hexdump_ascii(len=51):
     30 30 30 31 30 31 31 32 33 34 35 36 37 39 30 34   0001011234567904
     40 77 6c 61 6e 2e 6d 6e 63 30 31 31 2e 6d 63 63   @wlan.mnc011.mcc
     30 30 31 2e 33 67 70 70 6e 65 74 77 6f 72 6b 2e   001.3gppnetwork.
     6f 72 67                                          org
1388544511.042032: EAP: EAP entering state SEND_RESPONSE
1388544511.042045: EAP: EAP entering state IDLE
1388544511.042054: EAPOL: SUPP_BE entering state RESPONSE
1388544511.042062: EAPOL: txSuppRsp
1388544511.042072: TX EAPOL: dst=84:1b:5e:5d:a7:70
1388544511.042083: TX EAPOL - hexdump(len=60): 01 00 00 38 02 00 00 38 01 30 30 30 31 30 31 31 32 33 34 35 36 37 39 30 34 40 77 6c 61 6e 2e 6d 6e 63 30 31 31 2e
6d 63 63 30 30 31 2e 33 67 70 70 6e 65 74 77 6f 72 6b 2e 6f 72 67
1388544511.042134: EAPOL: SUPP_BE entering state RECEIVE
1388544511.042224: nl80211: Event message available
1388544511.042246: nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for sta5
1388544511.042255: nl80211: Ignore connect event (cmd=46) when using userspace SME
1388544511.042352: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
1388544511.042367: RTM_NEWLINK, IFLA_IFNAME: Interface 'sta5' added
1388544511.042384: nl80211: if_removed already cleared - ignore event
1388544511.042394: RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
1388544511.042402: RTM_NEWLINK, IFLA_IFNAME: Interface 'sta5' added
1388544511.042416: nl80211: if_removed already cleared - ignore event
1388544511.052265: sta5: RX EAPOL from 84:1b:5e:5d:a7:70
1388544511.052291: RX EAPOL - hexdump(len=26): 02 00 00 16 01 01 00 16 04 10 a8 76 63 d4 6a 58 cc 9c 04 12 82 66 d6 49 ca 97
1388544511.052308: EAPOL: Received EAP-Packet frame
1388544511.052317: EAPOL: SUPP_BE entering state REQUEST
1388544511.052324: EAPOL: getSuppRsp
1388544511.052330: EAP: EAP entering state RECEIVED
1388544511.052343: EAP: Received EAP-Request id=1 method=4 vendor=0 vendorMethod=0
1388544511.052351: EAP: EAP entering state GET_METHOD
1388544511.052358: EAP: configuration does not allow: vendor 0 method 4
1388544511.052364: EAP: vendor 0 method 4 not allowed
1388544511.052372: sta5: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=4 -> NAK
1388544511.052378: EAP: Status notification: refuse proposed method (param=MD5)
1388544511.052388: EAP: Building EAP-Nak (requested type 4 vendor=0 method=0 not allowed)
1388544511.052398: EAP: allowed methods - hexdump(len=1): 17
1388544511.052405: EAP: EAP entering state SEND_RESPONSE
1388544511.052414: EAP: EAP entering state IDLE
1388544511.052421: EAPOL: SUPP_BE entering state RESPONSE
1388544511.052427: EAPOL: txSuppRsp
1388544511.052433: TX EAPOL: dst=84:1b:5e:5d:a7:70
1388544511.052440: TX EAPOL - hexdump(len=10): 01 00 00 06 02 01 00 06 03 17
1388544511.052475: EAPOL: SUPP_BE entering state RECEIVE
1388544511.067469: sta5: RX EAPOL from 84:1b:5e:5d:a7:70
1388544511.067494: RX EAPOL - hexdump(len=72): 02 00 00 44 01 b8 00 44 17 01 00 00 01 05 00 00 73 04 ad 6b 65 1b bb 43 48 2e 7f f6 86 00 79 56 02 05 00 00 ef 49
ce d4 06 93 80 00 52 1d a0 ad b3 72 e4 90 0b 05 00 00 06 62 58 ab ed 16 d1 05 76 04 95 c4 dc c6 15 49
1388544511.067531: EAPOL: Received EAP-Packet frame
1388544511.067541: EAPOL: SUPP_BE entering state REQUEST
1388544511.067547: EAPOL: getSuppRsp
1388544511.067555: EAP: EAP entering state RECEIVED
1388544511.067569: EAP: Received EAP-Request id=184 method=23 vendor=0 vendorMethod=0
1388544511.067578: EAP: EAP entering state GET_METHOD
1388544511.067590: sta5: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=23
1388544511.067598: EAP: Status notification: accept proposed method (param=AKA)
1388544511.067609: EAP: Initialize selected EAP method: vendor 0 method 23 (AKA)
1388544511.067621: EAP-AKA: CONTINUE -> CONTINUE
1388544511.067632: sta5: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 23 (AKA) selected
1388544511.067641: EAP: EAP entering state METHOD
1388544511.067648: EAP-AKA: EAP data - hexdump(len=68): 01 b8 00 44 17 01 00 00 01 05 00 00 73 04 ad 6b 65 1b bb 43 48 2e 7f f6 86 00 79 56 02 05 00 00 ef 49 ce
d4 06 93 80 00 52 1d a0 ad b3 72 e4 90 0b 05 00 00 06 62 58 ab ed 16 d1 05 76 04 95 c4 dc c6 15 49
1388544511.067686: EAP-AKA: Subtype=1
1388544511.067694: EAP-SIM: Attribute: Type=1 Len=20
1388544511.067702: EAP-SIM: Attribute data - hexdump(len=18): 00 00 73 04 ad 6b 65 1b bb 43 48 2e 7f f6 86 00 79 56
1388544511.067718: EAP-SIM: AT_RAND
1388544511.067727: EAP-SIM: Attribute: Type=2 Len=20
1388544511.067735: EAP-SIM: Attribute data - hexdump(len=18): 00 00 ef 49 ce d4 06 93 80 00 52 1d a0 ad b3 72 e4 90
1388544511.067754: EAP-AKA: AT_AUTN
1388544511.067764: EAP-SIM: Attribute: Type=11 Len=20
1388544511.067771: EAP-SIM: Attribute data - hexdump(len=18): 00 00 06 62 58 ab ed 16 d1 05 76 04 95 c4 dc c6 15 49
1388544511.067783: EAP-SIM: AT_MAC
1388544511.067789: EAP-SIM: Attributes parsed successfully (aka=1 encr=0)
1388544511.067796: EAP-AKA: subtype Challenge
1388544511.067803: EAP-AKA: UMTS authentication algorithm
1388544511.067809: EAP-AKA: Use internal Milenage implementation for UMTS authentication
1388544511.067821: Milenage: AUTN - hexdump(len=16): ef 49 ce d4 06 93 80 00 52 1d a0 ad b3 72 e4 90
1388544511.067834: Milenage: RAND - hexdump(len=16): 73 04 ad 6b 65 1b bb 43 48 2e 7f f6 86 00 79 56
1388544511.067857: Milenage: RES - hexdump(len=8): [REMOVED]
1388544511.067865: Milenage: CK - hexdump(len=16): [REMOVED]
1388544511.067872: Milenage: IK - hexdump(len=16): [REMOVED]
1388544511.067878: Milenage: AK - hexdump(len=6): [REMOVED]
1388544511.067884: Milenage: SQN - hexdump(len=6): 00 00 00 00 03 02
1388544511.067895: Milenage: AMF - hexdump(len=2): 80 00
1388544511.067906: Milenage: MAC_A - hexdump(len=8): 52 1d a0 ad b3 72 e4 90
1388544511.067915: EAP-AKA: Selected identity for MK derivation - hexdump_ascii(len=51):
     30 30 30 31 30 31 31 32 33 34 35 36 37 39 30 34   0001011234567904
     40 77 6c 61 6e 2e 6d 6e 63 30 31 31 2e 6d 63 63   @wlan.mnc011.mcc
     30 30 31 2e 33 67 70 70 6e 65 74 77 6f 72 6b 2e   001.3gppnetwork.
     6f 72 67                                          org
1388544511.067973: EAP-AKA: IK - hexdump(len=16): [REMOVED]
1388544511.067980: EAP-AKA: CK - hexdump(len=16): [REMOVED]
1388544511.067986: EAP-AKA: MK - hexdump(len=20): [REMOVED]
1388544511.067999: EAP-SIM: K_encr - hexdump(len=16): [REMOVED]
1388544511.068008: EAP-SIM: K_aut - hexdump(len=16): [REMOVED]
1388544511.068015: EAP-SIM: keying material (MSK) - hexdump(len=64): [REMOVED]
1388544511.068021: EAP-SIM: EMSK - hexdump(len=64): [REMOVED]
1388544511.068029: EAP-SIM: Verify MAC - msg - hexdump(len=68): 01 b8 00 44 17 01 00 00 01 05 00 00 73 04 ad 6b 65 1b bb 43 48 2e 7f f6 86 00 79 56 02 05 00 00
ef 49 ce d4 06 93 80 00 52 1d a0 ad b3 72 e4 90 0b 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1388544511.068059: EAP-SIM: Verify MAC - extra data - hexdump(len=0):
1388544511.068066: EAP-SIM: Verify MAC - K_aut - hexdump(len=16): [REMOVED]
1388544511.068079: EAP-SIM: Verify MAC: MAC - hexdump(len=16): 06 62 58 ab ed 16 d1 05 76 04 95 c4 dc c6 15 49
1388544511.068092: EAP-AKA: CONTINUE -> SUCCESS
1388544511.068099: Generating EAP-AKA Challenge (id=184)
1388544511.068106:    AT_RES
1388544511.068113:    AT_CHECKCODE
1388544511.068119:    AT_MAC
1388544511.068128: EAP-SIM: Add MAC - msg - hexdump(len=44): 02 b8 00 2c 17 01 00 00 03 03 00 40 a5 d2 c9 0c 02 c7 3d 2f 86 01 00 00 0b 05 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00
1388544511.068152: EAP-SIM: Add MAC - extra data - hexdump(len=0):
1388544511.068160: EAP-SIM: Add MAC - K_aut - hexdump(len=16): [REMOVED]
1388544511.068172: EAP-SIM: Add MAC: MAC - hexdump(len=16): 30 3a 97 8a ad 5b ad 00 10 bd 37 7c 18 ec 66 f1
1388544511.068186: EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=COND_SUCC
1388544511.068194: EAP-AKA: Derived Session-Id - hexdump(len=33): 17 73 04 ad 6b 65 1b bb 43 48 2e 7f f6 86 00 79 56 ef 49 ce d4 06 93 80 00 52 1d a0 ad b3 72 e4 90
1388544511.068209: EAP: Session-Id - hexdump(len=33): 17 73 04 ad 6b 65 1b bb 43 48 2e 7f f6 86 00 79 56 ef 49 ce d4 06 93 80 00 52 1d a0 ad b3 72 e4 90
1388544511.068226: EAP: EAP entering state SEND_RESPONSE
1388544511.068248: EAP: EAP entering state IDLE
1388544511.068257: EAPOL: SUPP_BE entering state RESPONSE
1388544511.068264: EAPOL: txSuppRsp
1388544511.068272: TX EAPOL: dst=84:1b:5e:5d:a7:70
1388544511.068279: TX EAPOL - hexdump(len=48): 01 00 00 2c 02 b8 00 2c 17 01 00 00 03 03 00 40 a5 d2 c9 0c 02 c7 3d 2f 86 01 00 00 0b 05 00 00 30 3a 97 8a ad 5b
ad 00 10 bd 37 7c 18 ec 66 f1
1388544511.068328: EAPOL: SUPP_BE entering state RECEIVE
1388544511.076522: sta5: RX EAPOL from 84:1b:5e:5d:a7:70
1388544511.076545: RX EAPOL - hexdump(len=8): 02 00 00 04 03 b9 00 04
1388544511.076560: EAPOL: Received EAP-Packet frame
1388544511.076570: EAPOL: SUPP_BE entering state REQUEST
1388544511.076581: EAPOL: getSuppRsp
1388544511.076589: EAP: EAP entering state RECEIVED
1388544511.076602: EAP: Received EAP-Success
1388544511.076610: EAP: Status notification: completion (param=success)
1388544511.076622: EAP: Workaround for unexpected identifier field in EAP Success: reqId=185 lastId=184 (these are supposed to be same)
1388544511.076630: EAP: EAP entering state SUCCESS
1388544511.076638: sta5: CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully
1388544511.076646: EAPOL: SUPP_BE entering state RECEIVE
1388544511.076654: EAPOL: SUPP_BE entering state SUCCESS
1388544511.076663: EAPOL: SUPP_BE entering state IDLE
1388544511.126596: nl80211: Event message available
1388544511.126639: nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for sta5
1388544511.126651: nl80211: Regulatory domain change
1388544511.126662: sta5: Event CHANNEL_LIST_CHANGED (31) received
1388544511.126805: nl80211: Regulatory information - country=US
1388544511.126825: nl80211: 2402-2472 @ 40 MHz
1388544511.126835: nl80211: 5170-5250 @ 40 MHz
1388544511.126846: nl80211: 5250-5330 @ 40 MHz
1388544511.126855: nl80211: 5490-5600 @ 40 MHz
1388544511.126864: nl80211: 5650-5710 @ 40 MHz
1388544511.126873: nl80211: 5735-5835 @ 40 MHz
1388544511.126885: nl80211: 57240-63720 @ 2160 MHz
1388544511.126910: nl80211: Added 802.11b mode based on 802.11g information
1388544511.126924: P2P: Add operating class 81
1388544511.126933: P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b
1388544511.126946: P2P: Add operating class 115
1388544511.126954: P2P: Channels - hexdump(len=4): 24 28 2c 30
1388544511.126963: P2P: Add operating class 124
1388544511.126971: P2P: Channels - hexdump(len=4): 95 99 9d a1
1388544511.126982: P2P: Add operating class 116
1388544511.126992: P2P: Channels - hexdump(len=2): 24 2c
1388544511.127001: P2P: Add operating class 117
1388544511.127008: P2P: Channels - hexdump(len=2): 28 30
1388544511.127020: P2P: Add operating class 126
1388544511.127029: P2P: Channels - hexdump(len=2): 95 9d
1388544511.127037: P2P: Add operating class 127
1388544511.127045: P2P: Channels - hexdump(len=2): 99 a1
1388544511.127057: P2P: Update channel list
1388544512.042059: EAPOL: startWhen --> 0
1388544515.892047: RX ctrl_iface - hexdump_ascii(len=6):
     53 54 41 54 55 53                                 STATUS
1388544515.892092: sta5: Control interface command 'STATUS'
1388544522.715068: RX ctrl_iface - hexdump_ascii(len=6):
     53 54 41 54 55 53                                 STATUS
1388544522.715116: sta5: Control interface command 'STATUS'
1388544529.482689: RX ctrl_iface - hexdump_ascii(len=6):
     53 54 41 54 55 53                                 STATUS
1388544529.482740: sta5: Control interface command 'STATUS'
1388544536.230047: RX ctrl_iface - hexdump_ascii(len=6):
     53 54 41 54 55 53                                 STATUS
1388544536.230100: sta5: Control interface command 'STATUS'
1388544541.044401: EAPOL: authWhile --> 0
1388544541.366842: RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
1388544541.366883: RTM_NEWLINK, IFLA_IFNAME: Interface 'sta5' added
1388544541.366913: nl80211: if_removed already cleared - ignore event
1388544541.366933: nl80211: Event message available
1388544541.366950: nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for sta5
1388544541.366962: nl80211: Delete station 84:1b:5e:5d:a7:70
1388544541.370794: nl80211: Event message available
1388544541.370822: nl80211: Drv Event 39 (NL80211_CMD_DEAUTHENTICATE) received for sta5
1388544541.370835: nl80211: MLME event 39 (NL80211_CMD_DEAUTHENTICATE) on sta5(00:0b:c8:b3:d9:80) A1=00:0b:c8:b3:d9:80 A2=84:1b:5e:5d:a7:70
1388544541.370852: nl80211: MLME event frame - hexdump(len=26): c0 00 3a 01 00 0b c8 b3 d9 80 84 1b 5e 5d a7 70 84 1b 5e 5d a7 70 00 10 06 00
1388544541.370880: nl80211: Deauthenticate event
1388544541.370894: sta5: Event DEAUTH (12) received
1388544541.370908: sta5: Deauthentication notification
1388544541.370918: sta5:  * reason 6
1388544541.370931: sta5:  * address 84:1b:5e:5d:a7:70
1388544541.370942: Deauthentication frame IE(s) - hexdump(len=0): [NULL]
1388544541.370954: sta5: CTRL-EVENT-DISCONNECTED bssid=84:1b:5e:5d:a7:70 reason=6


Thanks,
Ben
-- 
Ben Greear <greearb at candelatech.com>
Candela Technologies Inc  http://www.candelatech.com



More information about the HostAP mailing list